跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.90) 您好!臺灣時間:2025/01/22 12:55
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:林祺翰
研究生(外文):Chi-Han Lin
論文名稱:多層次友善介面圖像分享
論文名稱(外文):Multi-level User-Friendly Image Sharing
指導教授:王任瓚王任瓚引用關係
指導教授(外文):Ran-Zan Wang
學位類別:碩士
校院名稱:元智大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:中文
論文頁數:30
中文關鍵詞:圖像分享機密分享機密圖像分享友善介面之圖像分享
外文關鍵詞:image sharingsecret sharingsecret image sharinguser-friendly image sharing
相關次數:
  • 被引用被引用:0
  • 點閱點閱:365
  • 評分評分:
  • 下載下載:8
  • 收藏至我的研究室書目清單書目收藏:1
圖像分享是一種具有高容錯性及良好安全性的圖像保護機制。傳統圖像分享方法建立雜訊般的分存圖像,可以確保原圖像在分存圖像中的不可讀性,但也造成分存圖像不易識別管理的缺點。友善介面圖像分享方法建立原圖肖像般的分存圖像,提供分存圖像容易識別與管理介面,卻也讓原圖像喪失機密性。本論文結合傳統圖像分享與友善介面圖像分享的特性,設計一個多層次友善介面圖像分享技術。所提的n層式友善介面圖像分享方法,可讓使用者依照其應用將一張圖像的內容依重要性或機密性分成n ( n = 2, 3, …)個等級,並編碼成n+1張分存圖像。在單張分存圖像上,可以看出原圖中某些非機密等級區域的肖像,且這些區域與原圖的相似度隨等級增加而降低;而原圖為機密等級區域在分存中是完全看不到內容的。當使用者收集到2 張或更多的分存圖像時,即可將原圖像中的對應區域無失真解密,當n+1張分存圖像全部收集到時,則可將原圖無失真完全重建出。所提的圖像分享方法讓使用者可以從單張分存圖像中初窺原圖的大致結構,又可保護原圖像中的機密區域資訊。這個技術提供對具多層次重要性內容之圖像,如具機密資訊的設計圖等,一個兼具友善介面與機密保護的分享應用。

This study proposes a novel secret image sharing scheme, named Multi-level User-Friendly Image Sharing, for sharing multiple secrets on an image among n participants. The method enables the dealer to designate the content of an image S to multiple regions, with each region associates to a certain level of secrecy.

摘要 ii
目錄 iii
圖目錄 iii
第一章 簡介 5
1.1 研究背景與動機 1
1.2 文獻探討 6
1.3 研究目的與方向 10
第二章 相關研究 11
2.1. Shamir’s -(t, n)機密分享機制 7
2.2. Thien與Lin-(t, n)圖像分享機制 8
2.3. Wang等人-具可調分存圖像之友善介面圖像分享方法 9
第三章 所提方法 11
3.1. 方法流程 11
3.2. 圖像分享階段 13
3.3. 圖像還原階段 18
3.4. 所提方法之特性 19
第四章 實驗結果 21
第五章 總結與未來研究方向 29
參考文獻 30


[1]P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Optics Letters, Vol. 20, No. 7, pp. 767–769, 1995.
[2]P.P. Dang and P.M. Chau, “Image encryption for secure Internet multimedia applications,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 3, pp. 395–403, 2000.
[3]R.Z. Wang, C.F. Lin, and J.C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition, Vol. 34, No. 3, pp. 101–113, 2001.
[4]S.L. Li, K.C. Leung, L.M. Cheng and C.K. Chan, “A novel image-hiding scheme based on block difference,” Pattern Recognition, Vol. 39, No. 6, pp. 1168–1176, 2006.
[5]M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptography: Eurocrypt’94, Springer, Berlin, Vol. 950, pp. 1–12, 1995.
[6]C.C. Thien and J.C. Lin, “Secret image sharing,” Computers and Graphics, Vol. 26, No. 5, pp. 765–770, 2002.
[7]C.C. Thien and J.C. Lin, “An image sharing method with user-friendly shadow images,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 12, pp. 1161–1169, 2003.
[8]C.N. Yang, K.H. Yu and R. Lukac, “User-friendly image sharing using polynomials with different primes,” International Journal of Imaging Systems and Technology, Vol. 17, No. 1, pp. 40–47, 2007.
[9]K.Y. Chao and J.C. Lin, “User-friendly sharing of images: progressive approach based on modulus operations,” Journal of Electronic Imaging, Vol. 18, 033008 1–9, 2009.
[10]R.Z. Wang, Y.F. Chien and Y.Y. Lin, “Scalable user-friendly image sharing,” Journal of Visual Communication and Image Representation, Vol. 21, No 7, pp. 751−761, 2010.
[11]A. Shamir, “How to share a secret,” Communications of the ACM, Vol. 22, No.11, pp. 612–613, 1979.
[12]G.R. Blakley, “Safeguarding cryptographic keys,” AFIPS Conference Proceedings, Vol. 48, pp. 313–317, 1979.
[13]C.C. Lin and W.H. Tsai, “Secret image sharing with capability of share data reduction,” Optical Engineering, Vol. 42, No. 8, pp. 2340–2345, 2005.
[14]R.Z. Wang and C.H. Su, “Secret image sharing with smaller shadow images,” Pattern Recognition Letters, Vol. 27 No. 6, pp. 551–555, 2006.
[15]C.C. Chang, C.C. Lin, C.H. Lin, and Y.H. Chen, “A novel secret image sharing scheme in color images using small shadow images,” Information Sciences, Vol. 178, No. 11, pp. 2433–2447, 2008.
[16]C.C. Chang, M.N. Wu, “An algorithm for color image compression based on common bit map block truncation coding,” Proceedings of Joint Conference on Information Sciences, Vol. 6, pp. 964–967, 2002.
[17]C.C. Lin and W.H. Tsai, “Secret image sharing with steganography and authentication,” Journal of Systems & Software, Vol. 73, No. 3, pp. 405–414, 2004.
[18]C.N. Yang, T.S. Chen, K.H. Yu, and C.C. Wang, “Improvements of image sharing with steganography and authentication,” The Journal of Systems and Software, Vol. 80, No. 7, pp. 1070–1076, 2007.
[19]C.C. Chang, Y.P. Hsieh, and C.H. Lin, “Sharing secrets in stego images with authentication,” Pattern Recognition, Vol. 41, No. 10, pp. 3130–3137, 2008.
[20]P.Y. Lin, J.S. Lee and C.C. Chang, “Distortion-free secret image sharing mechanism using modulus operator,” Pattern Recognition, Vol. 42, No. 5, pp.886–895, 2009.
[21]P.Y. Lin and C.S. Chan, “Invertible secret image sharing with steganography,” Pattern Recognition Letter, Vol. 31, No.13, pp.1887−1893, 2010.
[22]S.K. Chen and J.C. Lin, “Fault-tolerant and progressive transmission of images,” Pattern Recognition, Vol. 38, No. 12, pp. 2466–2471, 2005.
[23]C.P. Huang, “Sharing secret images using integer single or multiple wavelet transform,” Journal of Communications Technology and Electronics, Vol. 56, No. 1, pp. 43−51, 2011.
[24]R.Z. Wang and S.J. Shyu, “Scalable secret image sharing,” Signal Processing: Image Communication, Vol. 22, No. 4, pp. 363–373, 2007.
[25]C.P. Huang, C.H. Hsieh and P.S. Huang, “Progressive sharing for a secret image,” The Journal of Systems and Software, Vol. 83, No. 3, pp. 517–527, 2010.
[26]S.J. Shyu, C.C. Chuang, Y.R. Chen and A.F. Lai, “Sharing an image with variable-sized shadows,” Journal of Internet Technology, Vol. 10, No. 2, pp.155–161, 2009.
[27]S.J. Lin, L.S.T. Chen and J.C. Lin, “Fast-weighted secret image sharing,” Optical Engineering, Vol. 48, No. 7, doi:10.1117/1.3168644, pp. 077008:1–7, 2009.


QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top